How to detect Kameleo in 2026
Kameleo is the antidetect browser of choice for organised fraud — affiliate networks, credit-card testers, account-takeover crews, ad-arbitrage rings. It ships with a custom Chromium fork (Mimic) and a Firefox fork (Junglefox), spoofs canvas/WebGL/audio context per profile, integrates with residential-proxy providers, and rotates fingerprints automatically. IP-reputation tools see clean residential traffic. Sentinel sees the tampering signature.
Detection signals that fire on Kameleo
Sentinel runs a consistency check across 40+ low-entropy fingerprint signals on every evaluation. The signals below are the ones that, in our internal testing, fire most reliably on fresh Kameleo profiles paired with residential proxies. None alone is diagnostic — the combination is.
How to integrate
Embed the Sentinel SDK on your signup, login, or checkout page. Server-side, call /v1/evaluate with the SDK token. The response includes device.antidetect (boolean) and device.tampering_score (0–1). Block, step-up, or score on the result.
See the API reference for the full request/response shape and the 2026 antidetect detection deep-dive for the underlying technique.
Free during open beta. 1,000 requests / hour. No card.